City: New York
Region: New York
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.67.3.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.67.3.194. IN A
;; AUTHORITY SECTION:
. 172 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040901 1800 900 604800 86400
;; Query time: 185 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 10 06:15:49 CST 2022
;; MSG SIZE rcvd: 105
194.3.67.104.in-addr.arpa domain name pointer a104-67-3-194.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
194.3.67.104.in-addr.arpa name = a104-67-3-194.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
76.10.157.36 | attackspambots | SSH login attempts. |
2020-02-17 19:22:03 |
201.149.20.162 | attackbots | *Port Scan* detected from 201.149.20.162 (MX/Mexico/162.20.149.201.in-addr.arpa). 4 hits in the last 10 seconds |
2020-02-17 18:55:14 |
114.125.81.69 | attackbots | This ip has carried out DDoS attacks, please report this ip thank you ! |
2020-02-17 18:59:00 |
125.209.98.6 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 17-02-2020 04:55:09. |
2020-02-17 19:31:33 |
106.13.138.225 | attackspam | Feb 17 06:40:29 dedicated sshd[19171]: Invalid user whitehat from 106.13.138.225 port 58318 |
2020-02-17 19:19:30 |
196.218.12.6 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 18:59:27 |
95.81.207.241 | attackspam | Automatic report - Port Scan Attack |
2020-02-17 19:08:58 |
196.218.104.5 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 19:22:58 |
104.47.58.110 | attackspambots | SSH login attempts. |
2020-02-17 19:18:11 |
68.65.121.105 | attackbotsspam | Invalid user humphrey from 68.65.121.105 port 33808 |
2020-02-17 19:23:42 |
104.47.2.33 | attack | SSH login attempts. |
2020-02-17 19:20:21 |
196.218.112.123 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 19:03:13 |
45.148.10.143 | attackspam | [portscan] tcp/22 [SSH] *(RWIN=65535)(02171127) |
2020-02-17 19:16:29 |
62.171.137.194 | attack | Failed password for invalid user ubnt from 62.171.137.194 port 37782 ssh2 |
2020-02-17 19:29:50 |
196.218.107.8 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 19:14:32 |